关联漏洞
标题:
D-Link多款产品 安全漏洞
(CVE-2024-10914)
描述:D-Link DNS-320等都是中国友讯(D-Link)公司的一款NAS(网络附属存储)设备。 D-Link多款产品存在安全漏洞,该漏洞源于对参数name的错误操作会导致操作系统命令注入。以下产品及版本受到影响:D-Link DNS-320、DNS-320LW、DNS-325和DNS-340L 20241028版本及之前版本。
描述
A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
介绍
# CVE-2024-10914 - D-Link Remote Code Execution (RCE)
This repo contains a proof-of-concept (PoC) exploit for a critical vulnerability affecting D-Link NAS devices. The bug, tracked as **CVE-2024-10914**, impacts the following models:
- **D-Link DNS-320**
- **D-Link DNS-320LW**
- **D-Link DNS-325**
- **D-Link DNS-340L**
The vulnerability is in a function called `cgi_user_add`, which is part of the `/cgi-bin/account_mgr.cgi` script.
The bug happens because the `name` parameter isn't properly checked before it’s used in system commands.
This lets an attacker send malicious input (OS commands) in the `name` field to execute anything they want on the device.
For example an attacker can send/execute an `id` command through the path of the `name` field `/cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;id;%27`
# Disclaimer
This PoC is only for testing and learning purposes. I’m not responsible for any illegal or harmful use of this code. Always act responsibly when researching or testing vulnerabilities.
文件快照
[4.0K] /data/pocs/d3f60f7cb50bf37610b2b265fe70205688471e9f
├── [5.3K] CVE-2024-10914.py
├── [1.0K] README.md
└── [ 53] requirements.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。